Search Header Logo

Year 9 Spr1 Lesson 7 PREVENTION

Authored by Thomas Reynolds

Information Technology (IT)

8th Grade

Used 4+ times

Year 9 Spr1 Lesson 7 PREVENTION
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a possible consequence to a business of a cyber-attack?

Loss of customer trust

Increased revenue

Improved security

Expansion of business

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the possible consequences to a business of a cyber-attack?

Loss of data / financial data / reputation

Operational / financial / commercial disruption

Safety of equipment, with personal safety implications

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify basic physical and logical cyber-security prevention methods.

Firewalls and antivirus software

Encryption and access controls

Security policies and employee training

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best compares different methods of physical and logical security?

Physical security involves protecting hardware and facilities, while logical security protects data and software.

Logical security involves protecting hardware and facilities, while physical security protects data and software.

Both physical and logical security focus on protecting data and software.

Physical security and logical security are the same and focus on protecting hardware.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Evaluate different methods of physical and logical security.

Physical security includes methods like surveillance cameras and locks, while logical security involves firewalls and encryption.

Physical security involves firewalls and encryption, while logical security includes surveillance cameras and locks.

Both physical and logical security involve only digital methods.

Physical security and logical security are the same and involve only physical barriers.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: _______ methods prevent a user from physically gaining access to a device.

Physical

Logical

Virtual

Remote

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: _______ methods use software to restrict user access to data.

Logical

Physical

Biometric

Token-based

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?